HOW TO PROTECT AGAINST LOG4J2 VULNERABILITY
There has been a whopping increase in supply chain attacks aimed at upstream open-source libraries and software components. Interestingly, despite the risk, the trend in the industry shows a strong growth in the supply and demand of open-source software. The most recent exploit on the Java logging library (log4j) has shaken the IT industry due
Read More